Efficient Message Authentication Codes with Combinatorial Group Testing

被引:9
|
作者
Minematsu, Kazuhiko [1 ]
机构
[1] NEC Corp Ltd, Kawasaki, Kanagawa 213, Japan
来源
关键词
Message authentication code; Combinatorial group testing; Data corruption; Provable security; CONSTRUCTIONS; SECURITY; DESIGN;
D O I
10.1007/978-3-319-24174-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can not identify which part is corrupted in case of invalid message. In this paper we study a class of MAC functions that enables to identify the part of corruption, which we call group testing MAC (GTM). This can be seen as an application of a classical (non-adaptive) combinatorial group testing to MAC. Although the basic concept of GTM (or its keyless variant) has been proposed in various application areas, such as data forensics and computer virus testing, they rather treat the underlying MAC function as a black box, and exact computation cost for GTM seems to be overlooked. In this paper, we study the computational aspect of GTM, and show that a simple yet non-trivial extension of parallelizable MAC (PMAC) enables O(m + t) computation for m data items and t tests, irrespective of the underlying test matrix we use, under a natural security model. This greatly improves efficiency from naively applying a black-box MAC for each test, which requires O(mt) time. Based on existing group testing methods, we also present experimental results of our proposal and observe that ours runs as fast as taking single MAC tag, with speed-up from the conventional method by factor around 8 to 15 for m = 10(4) to 10(5) items.
引用
收藏
页码:185 / 202
页数:18
相关论文
共 50 条
  • [1] Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks
    Bansal, Gaurang
    Sikdar, Biplab
    [J]. IEEE Internet of Things Magazine, 2022, 5 (02): : 102 - 106
  • [2] COMBINATORIAL CHARACTERIZATIONS OF AUTHENTICATION CODES
    STINSON, DR
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 61 - 73
  • [3] Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
    Nilsson, Dennis K.
    Larson, Ulf E.
    Jonsson, Erland
    [J]. 68TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2008, 2008, : 1203 - 1207
  • [4] Aggregate message authentication codes
    Katz, Jonathan
    Lindell, Andrew Y.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 155 - +
  • [5] Cryptanalysis of message authentication codes
    Preneel, B
    [J]. INFORMATION SECURITY, 1998, 1396 : 55 - 65
  • [6] Combinatorial bounds on authentication codes with arbitration
    Kurosawa, K
    Obana, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2001, 22 (03) : 265 - 281
  • [7] Combinatorial Bounds on Authentication Codes with Arbitration
    Kaoru Kurosawa
    Satoshi Obana
    [J]. Designs, Codes and Cryptography, 2001, 22 : 265 - 281
  • [8] Group Message Authentication
    Przydatek, Bartosz
    Wikstroem, Douglas
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 399 - 417
  • [9] Combinatorial Designs for Authentication and Secrecy Codes
    Huber, Michael
    [J]. FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (06): : 581 - +
  • [10] Erasure combinatorial batch codes based on nonadaptive group testing
    Dongdong Jia
    Sumei Zhang
    Gengsheng Zhang
    [J]. Designs, Codes and Cryptography, 2019, 87 : 1647 - 1656